Newsletter

01.11.2022 | 5'' read

The eternal stench of consumer AV

by Ryan Naraine

* This edition of the newsletter is presented by Symmetry Systems and SecurityWeek.

The most clicked link from last week’s issue was the documentation of an in-the-wild rootkit discovered infecting HP iLO firmware.

Note.
  • I’ll be interviewing Coveware chief executive Bill Siegel on the murky world of ransomware negotiations with cybercriminal gangs. Catch the session at the Ransomware Resilience & Recovery Summit on Jan 26th.

Monday blues.

The consumer AV business has been dead and buried for a few years (seriously, all you need is the free Windows Defender!) but we can’t seem to get rid of the leftover stench.

The once-mighty consumer AV brands are now openly scratching around for dollars in the dubious world of cryptocurrency mining (see Norton Crypto and Avira Crypto), turning idle AV engines into coin-miners on behalf of mostly confused consumers.

Instead of innovating to protect users from crypto-jacking malware (this really is a major menace), we now have security vendors dabbling in business models that are at odds with providing protection to end users.

By the way, Radio Shack is also a new crypto-mining company.  Don’t even laugh.

Today is Patch Tuesday and the word “wormable” is back in vogue.  Update those Windows boxes and remember to reboot those iPhones at least once a week.

Cheers,

_ryan

On to the newsletter…


Sponsored:  Symmetry DataGuard

Using Symmetry DataGuard, cloud-security teams tighten IAM policies around data, incident response teams know precisely what data objects are involved in a breach, and governance teams audit every access across every data store. Schedule a demo.


A new podcast for your earholes.

Catch my latest interview with Justin Campbell, head of the Microsoft Offensive Research and Security Engineering (MORSE) team.  We chat about his team’s discovery of an in-the-wild zero-day being exploited by Chinese APT, the never-ending stream of memory safety vulnerabilities haunting the industry, the evolving ‘shift-left’ developer mindset and Redmond’s ongoing work to reduce attack surfaces. Listen here.

Don’t miss recent conversations with Costin Raiu on the mercenary hacker-for-hire industry and Corellium’s Amanda Gorton on raising a $25 million funding round for virtualization technology.


Security response priorities.


Apache decries open-source leechers.

Shout-out to the Apache Software Foundation (ASF) volunteers for calling a spade a spade.  In a position paper published ahead of a White House meeting tomorrow, the open-source group called out companies that leech on the open-source ecosystem.

Quotable snippets from the world’s largest open-source non-profit:

“Community is defined by those who show up and do the work. Companies that build open source into their products rarely participate in their continued maintenance.”

“Only a tiny percentage of downstream companies (reusing the same code within their own products) choose to participate [in ASF security projects].”

“Help fix bugs. Conduct security audits and feed back the results.  Cash, while welcome and useful, isn’t sufficient.  We eagerly welcome audits and fixes from any source.”  

​”Security directives MUST avoid placing additional unfunded burdens on the few maintainers who are already doing the work.”

This is one of computing’s big shame and this is what happens when open-source developers start to feel abused by profitable companies.


Must-read research.


Essays.


The VC bubble.


Tangentially.

P.S. Full podcast episodes are available on the SecurityConversations.com home page, and on all major platforms. Subscribe directly: Apple/iPhoneGoogle/AndroidSpotify and Amazon/Audible.

|

This site uses cookies and may process personal data based on our Privacy Policy